Lines Matching defs:guest
134 * the amount of time a guest is allowed to execute in a pause loop.
286 * Free the nested guest state, unless we are in SMM.
287 * In this case we will return to the nested guest
362 * For guest debugging where we have to reinject #BP if some
363 * INT3 is guest-owned:
415 * By increasing VCPU's osvw.length to 3 we are telling the guest that
419 * be conservative here and therefore we tell the guest that erratum 298
436 pr_info("KVM is unsupported when running as an SEV guest\n");
791 /* Clear our flags if they were not set by the guest */
1090 * roots, or if INVPCID is disabled in the guest to inject #UD.
1198 * It also updates the guest-visible cr0 value.
1430 /* Hide our flags if they were not set by the guest */
1944 * the guest to be always treated like user space, no matter what context
1951 .cs = 3, /* Fake ring 3 no matter what the guest ran on */
1964 * guest.
2775 /* Don't allow the guest to change a bit, #GP */
3490 * can't read guest memory (dereference memslots) to decode the WRMSR.
3510 * guest mode as interrupt enabled.
3513 * transition to guest mode and if enabled adjusts RCU state
3537 * have them in state 'on' as recorded before entering guest mode.
3600 * If this vCPU has touched SPEC_CTRL, restore the guest's value if
3614 * (Saving guest MSRs on vmexit) doesn't even exist in KVM.
3782 * AVIC does not work with an x2APIC mode guest. If the X2APIC feature
3783 * is exposed to the guest, disable AVIC.
3791 * So, we disable AVIC when cpuid for SVM is set in the L1 guest.
3974 /* TODO: Advertise NRIPS to guest hypervisor unconditionally */
4059 u64 guest = GET_SMSTATE(u64, smstate, 0x7ed8);
4062 if (guest) {
4102 /* Emulation is always possible when KVM has access to all guest state. */
4110 * When CPU raise #NPF on guest data access and vCPU CR4.SMAP=1, it is
4114 * return 0 instead of the correct guest instruction bytes.
4126 * in case vCPU CPL==3 (Because otherwise guest would have triggered
4134 * To determine what instruction the guest was executing, the hypervisor
4137 * In non SEV guest, hypervisor will be able to read the guest
4141 * But in the SEV guest, the guest memory is encrypted with the
4142 * guest specific key and hypervisor will not be able to decode the
4144 * print the error and request to kill the guest.
4158 * to avoid killing the guest and to hopefully avoid confusing
4159 * the guest kernel too much, e.g. injecting #PF would not be
4160 * coherent with respect to the guest's page tables. Request
4162 * no fault that KVM can inject without confusing the guest.
4181 * vCPU is in guest-mode and vmcb12 defines intercept on INIT.